logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2014-4113

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2014-4113

Description:
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
Last updated date:
07/02/2024

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
10/14/2014
Reference url to background

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058

Type:
exploitation
Confidence:
HIGH
Date of publishing:
02/26/2019
Type:
exploitation
Confidence:
HIGH
Date of publishing:
05/04/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
11/19/2014
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/22/2016
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/07/2016
Reference url to background

https://github.com/sam-b/CVE-2014-4113

Type:
exploit
Confidence:
HIGH
Date of publishing:
02/26/2019
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/26/2019
Reference url to background

http://www.exploit-db.com/exploits/35101

Type:
exploit
Confidence:
HIGH
Date of publishing:
07/21/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/02/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/02/2024
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy